Вы находитесь на странице: 1из 31

1

Networking

Assignment 2

Prepared for :

Mr. Dang Quang Hien

Greenwich University Da Nang

Prepared by:

Le Vo Thang
2

QUALIFICATION

BTEC HN Diploma in Computing and Unit 43: Networking Infrastructure


system Development

UNIT CODE A/601/1964


QCF LEVEL 5 BTEC HIGHER NATIONAL DIPLOMA

CREDIT VALUE 15

Issue Date: Completion Date: Submitted:

Assignment Title : Understanding of networking infrastructures


management

GRADING GRID

P1.1 P1.2 P1.3 P2.1 P2.2 P2.3 P3.1 P4.1 P4.2 M1 M2 M3 D1 D2 D3

LO Learning Outcome AC In this assessment you will have the Task


(LO) opportunity to present evidence that No.
shows you are able to:

LO Understand the P 1.1 A) Evaluate current name resolution


1 principles of network services B) Explain the OSI/TCP/IP
infrastructure layer model
management and list
P 1.2 Discuss the technologies that support
the different type of
network infrastructure management and
Network
list network type
3

P 1.3 Discuss security resources available in


network infrastructure management

LO Be able to understand P 2.1 Discuss the role of software and


2 network infrastructure hardware components for the given
systems company case study.

P 2.2 A) Discuss server types and selection


requirement.
B) List & explain the protocols available
at the application layer

P 2.3 Evaluate rights and security


requirements for a given networked
environment

LO Be able to implement P 3.1 Implement a network design topology


3 complex network infrastructure based on a prepared
topology infrastructure design and list the different type of
systems topologies.

LO Be able to test P 4.1 Critically review, why different network


4 complex network standards and protocols are necessary
infrastructure systems
P 4.2 Evaluate system and user assurance of
the implemented system

Learners declaration
I certify that the work submitted for this assignment is my own and research sources are fully
acknowledged.
Student signature: Thang Date: 25/9/2018
4

ASSESMENT CRITERIA

Qualification Pearson BTEC HND Assessor name


Diploma in Computing MR. MICHAEL OMAR
and Systems
Development

Unit number, Unit Unit 43: Networking Student name


Level, Unit Credit and Infrastructure
Title

Criteria Reference

LO 1

P 1.1 Evaluate current name resolution services

P 1.2 Discuss the technologies that support network


infrastructure management

P 1.3 Discuss security resources available in network


infrastructure management

LO 2

P 2.1 Design a network infrastructure for a given


networked environment

P 2.2 Evaluate addressing and deployment solutions for


a given networked environment

P 2,3 Evaluate rights and security requirements for a


given networked environment

LO 3
5

P 3.1 Implement a network infrastructure based on a


prepared design

LO 4

P 4.1 Critically review and test an implemented system

P 4.2 Evaluate system and user assurance of the


implemented system

Higher Grade Achievement (Where applicable)

Grade Descriptor Comment’s /tick Grade Descriptor Comment’s /tick

M1: Compare common D1: Considering a given


networking principles scenario, identify the
and how protocols topology protocol
enable the effectiveness selected for the efficient
of networked systems. utilisation of a
networking system.

M2: Explore a range of D2: Design a


server types and justify maintenance schedule
the selection of a to support the
server, considering a networked system
given scenario
regarding cost and
performance
optimisation.

M3: Install and D3: Use critical


configure network reflection to evaluate
services and own work and justify
applications on your valid conclusions
choice
6

Assignment Feedback

Formative Feedback: Assessor to Student

Action Plan

Summative feedback

Assessor Date
Signature

Student Signature Date


7

Table of Contents

Task 1 ......................................................................................................................................................... 8
P1.1 .......................................................................................................................................................... 8
A) Evaluate current name resolution services

B) Explain the OSI/TCP/IP layer model

P1.2 ........................................................................................................................................................ 16
A) Discuss the technologies that support network infrastructure management
B) List network type :

P1.3 ........................................................................................................................................................ 18
A) Discuss security resources available in network infrastructure management

Task 2 .......................................................................................................................................... 20
P2.1 ........................................................................................................................................................ 21
P2.2 ........................................................................................................... Error! Bookmark not defined.
P2.3......................................................................................................................................................... 27

Task 3 .......................................................................................................................................... 28
P3.1 ........................................................................................................................................................ 28

Task 4 ....................................................................................................................................................... 29
P4.1 ........................................................................................................................................................ 29
P 4.2........................................................................................................................................................ 30
References ………………………………………………………………………………………………………………………………31
8

Task 1

P1.1
Discuss the benefits and constraints of different networking systems, types and
topologies. Analyse and clearly identify the requirements of the system for this
network in order to convince the management of the given case study company.

A) Evaluate current name resolution services

I.DNS :

DNS stands for Domain Name Service .When the user enters the URL into the
Web browser, the request is not directly sent to the servers , instead that it goes
to the DNS server which uses a look-up table to determine IP address of the
requested website. Then it forwards the request to the proper servers and returns
the information to the user’s web browser .

DNS is a client/server network communication systems , DNS clients send the


requests to and receive the responses from DNS servers , The requests
containing the name , which result in an IP address being returned from the
server , they are called forward DNS lookups , The requests containing IP
address & resulting in the names that are called the reverse DNS lookups .
9

*Advantages :

1. Generally DNS is the only system in the entire world that can help you browse
the internet. With the internet becoming an integral part of the society, it has
increasingly become important that DNS Servers remain maintained. Without
them, then the internet would not exist.
2. No need for memorizing IP addresses -DNS servers provide a nifty solution of
converting domain or sub domain names to IP addresses. Imagine how it would
feel having to memorize the IP addresses of twitter, Facebook, Google or any
other site that you normally frequent on a daily basis. It would definitely be
horrific. Its system also makes it easy for search engines to be able to categorize
and archive information.
3. DNS servers have fast internet connections - Use DNS servers can be able to
take advantage of high connection speeds that are a key feature in some of
these servers.
DNS servers also have primary and secondary connections. This allows you to
have internet uptime even when one of the servers is down for maintenance.

*Disadvantages

1. DNS queries usually don’t carry any information about the clients who initiated it.
This is one of the reasons why DNS has been popular among hackers. This is
because the server side will only see the IP address from where the query came
from and which can at times be manipulated by hackers.
2. DNS servers are based on the principle of a slave-master relationship. This
means that if the master server is broken or manipulated in any way, then it will
be hard to access the web page or database that was hosted on the server.
Hackers have also used this to their advantage. By targeting the server machine
and making redirects to other pages, they have been able to find ways of
phishing information.
10

B) Explain the OSI/TCP/IP layer model

+ Explain the OSI model :

*Definition :

The OSI model (Open System Interconnection) model defines a computer networking
framework to implement protocols in seven layers. A protocol in the networking terms is
a kind of negotiation and rule in between two networking entities.

*Layers of OSI model:


11

1.Physical layer :

-Send data on to the physical wire.

-Hardware layer of the OSI layer

-Devices like repeater, hub, cables, ethernet work on this layer

-Protocols like RS232, ATM, FDDI, Ethernet work on this layer

2.Data Link layer :

-Read the MAC address from the data packet.

-Convers electrical signals into frames

-The data link layer is divided into two sub-layers

+The Media Access Control (MAC) layer

+Logical Link Control (LLC) layer.

-Devices like Switch work at this layer


12

3.Network Layer :

-Reads the IP address from the packet.

-Switching and routing .

-Creates logical paths between two hosts across the world wide web called as virtual
circuits

-Routes the data packet to destination

-Routing and forwarding of the data packets.

-Router works at layer three

-Different network protocols like TCP/ IP, IPX, AppleTalk work at this layer

4. Transport layer :

-Responsible for the transport protocol and error handling.

-Protocols like SPX, TCP, UDP work here


13

5. Session layer :

-Responsible for establishment, management and termination of connections between


applications.

The session layer sets up, coordinates, and terminates conversations, exchanges, and
dialogues between the applications at each end.

-Protocols like NFS, NetBios names, RPC, SQL work at this layer.

6. Presentation layer :

-Responsible for data representation on your screen

-Encryption and decryption of the data

-Data semantics and syntax

-Layer 6 Presentation examples include encryption, ASCII, EBCDIC, TIFF, GIF, PICT,
JPEG, MPEG, MIDI.

7. Application Layer :

-Application layer supports application, apps, and end-user processes.

-Quality of service

-This layer is responsible for application services for file transfers, e-mail, and other
network software services.

-Protocols like Telnet, FTP, HTTP work on this layer.


14

+ Explain the TCP/IP layer model :

*Definition :

TCP/IP, or the Transmission Control Protocol/Internet Protocol, is a suite of


communication protocols used to interconnect network devices on the internet. TCP/IP
can also be used as a communications protocol in a private network (an intranet or an
extranet).

TCP/IP specifies how data is exchanged over the internet by providing end-to-end
communications that identify how it should be broken into packets, addressed,
transmitted, routed and received at the destination.
15

* TCP/IP layer model :

TCP/IP is divided into four layers, each of which include specific protocols :

-The application layer provides applications with standardized data exchange. Its
protocols include the Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP),
Post Office Protocol 3 (POP3), Simple Mail Transfer Protocol (SMTP) and Simple
Network Management Protocol (SNMP).

-The transport layer is responsible for maintaining end-to-end communications across


the network. TCP handles communications between hosts and provides flow control,
multiplexing and reliability. The transport protocols include TCP and User Datagram
Protocol (UDP), which is sometimes used instead of TCP for special purposes.

-The network layer, also called the internet layer, deals with packets and connects
independent networks to transport the packets across network boundaries. The network
layer protocols are the IP and the Internet Control Message Protocol (ICMP), which is
used for error reporting.

-The physical layer consists of protocols that operate only on a link -- the network
component that interconnects nodes or hosts in the network. The protocols in this layer
include Ethernet for local area networks (LANs) and the Address Resolution Protocol
(ARP).
16

P1.2

Evaluate the impact of current network technology, communication and standards


for the given case.

A) Discuss the technologies that support network infrastructure management

-Ethernet is the most widely installed local area network (LAN) technology. Ethernet is a
link layer protocol in the TCP/IP stack, describing how networked devices can format
data for transmission to other network devices on the same network segment, and how
to put that data out on the network connection. It touches both Layer 1 (the physical
layer) and Layer 2 (the data link layer) on the OSI network protocol model. Ethernet
defines two units of transmission, packet and frame.
The most commonly installed Ethernet systems are called 100 BASE-T (the "BASE-T"
part means the systems use twisted-pair cabling) and provide transmission speeds up to
100 megabits per second (Mbps).

- PPP (Point-to-Point Protocol) refers to a family of computer networking protocols that


provide a standard way to transport multiprotocol data over point-to-point links. PPP has
three main components: a way to encapsulate multiprotocol datagrams; a Link Control
Protocol to establish, configure and test the data-link connection; and a group of network
control protocols that establish and configure different types of network-layer protocols.
In terms of the OSI model, PPP provides Layer 2, or data-link, service. PPP is a full-
duplex protocol that can be used on a variety of physical media, including twisted pair
copper wire, fiber optic lines or satellite links.
17

B) List network type :

1.Local area networks (LANs) :

A local area network (LAN) is a group of computers and associated devices that share a
common communications line or wireless link to a server. LAN including computers and
peripherals connected to a server within a distinct geographic area such as an office or a
school. Computers and other mobile devices use a LAN connection to share resources
such as a printer or network storage.
Ethernet and Wi-Fi are the two primary ways to enable LAN connections. Ethernet is a
specification that enables computers to communicate with each other. Wi-Fi uses radio
waves to connect computers to the LAN. Other LAN technologies, including Token Ring,
Fiber Distributed Data Interface and ARCNET, have lost favor as Ethernet and Wi-Fi
speeds have increased. The rise of virtualization has fueled the development of virtual
LANs, which allows network administrators to logically group network nodes and
partition their networks without the need for major infrastructure changes.
Users can order printing and other services as needed through applications run on the
LAN server. A user can share files with others stored on the LAN server; read and write
access is maintained by a network administrator.
18

P1.3

Discuss how protocols enable the effective utilization of different networking systems.

A) Discuss security resources available in network infrastructure management

-Physical security :

Physical security ensures the physical protection of IT assets like facilities,


equipment, personnel, resources and other properties from damage and
unauthorized physical access : theft, vandalism, fire and natural disasters .

+Physical barriers :

The outermost layer of network physical security aims to keep people as far
away from your data center property as possible

Using fences, locks, access control cards, biometric access control systems and
fire suppression systems can keep people from getting too close. Consider your
physical security to be almost like a physical “firewall” for your building.

+Use surveillance cameras, motion sensors, security lights and personnel like
security guards and watch dogs.

-Set up a Strong Password to Protect computer and system files

+The password has at least 8 characters and at least one upper case, one lower
case, one number and one special character.

+ No using personal Information to create password.

+ Create Unique Passwords for Each Account

+ Use a Password Checker tools.

+ Remember Password ‘s backup information.


19

-Use Anti- Virus protection :

Data is the most crucial and essential component of every organization, and no
one would want to risk the confidential data to the viruses approaching the
computer system.

Antivirus are recommended for every computer system to keep it secure from
any unknown threats from the internet, external drives, CD/DVDs.

*Advantages :

+Protection from Viruses & Spyware

Antivirus has the primary job of detecting any sought of viruses, spyware,
malware and other unknown threats and removing the same before they can do
any harm to the data present in a computer system.

+Protection from Phishing Attacks

Phishing is termed as an unauthorized attempt by any third person or hacker to


access the data present in Nowadays with the intention of stealing the same or
infect the data so that it can’t be usable to the user.

+Provides Robust Web Protection

With the increased use of the internet, various online cyber threats are affecting
the data security of the computer. Antivirus software takes control of the web
activities limiting unauthorized access of any online threat.
20

-Encryption the data :

+Maintains Integrity

Hackers don’t just steal information, they also can benefit from altering data to
commit fraud. While it is possible for highly skilled and technical individuals to
alter encrypted data, recipients of the data will be able to detect the corruption,
allowing for a quick response to the cyber-attack.

+Secure Data At All Times

Encryption works when data is stored or transferred, making it an ideal solution


no matter how data is being used. Usually, data is most vulnerable to attack
when being moved from one place to another, therefore encryption ensures
protection during this process.

+Protects Privacy

Encryption is used to protect sensitive data, including personal information for


individuals. Encryption therefore ensures anonymity and privacy, reducing
opportunities for surveillance by both criminals and government agencies. The
technology is so effective Encryption technology is so effective that some
governments are attempting to put limits on the effectiveness of encryption.
21

Task 2
P2.1
Discuss the role of software and hardware components for the given company case study.

1.UTP cable

Unshielded twisted pair (UTP) is a famous type of copper cabling used in telephone wiring and
local area networks (LANs). UTP cable has two unshielded wires (insulated copper wires) as its
parts, and these are twisted more or less each other in order to reduce the crosstalk or else
electromagnetic field making between the working pairs of insulated wires. There are 4 types of
UTP cables : Cat 3 UTP, Cat 5 UTP, Cat 5e UTP and Cat 6 UTP - each supporting a different
amount of bandwidth. Almost enterprises is prefered UTP cable due to its low cost and ease of
installation.

2. Switch :

A PC or other networked device sends a frame to another device through the switch,
the switch captures the source MAC address of the frame. The initial communication to
a switch is an Address Resolution Protocol (ARP) request. The inbound ARP contains
the sender’s MAC address, and the switch adds that address to its lookup table..

When a switch has learned the locations of the devices connected to it, it ‘s ready to
either forward or filter frames based on the destination MAC address of the frame and
the contents of the switch lookup table.

If the switch has already found the port of device A by its MAC address ff ff ff ff ff ff and
switch port number 2. The switch will receive the incoming frame, examine the
destination address of the Ethernet frame, and check its lookup table. The switch will
then make a decision to forward the frame out port 2, and only port 2.
22

3. Router :

Routing is the process during which data packets are forwarded from one machine or
device (a node) to another on a network until they reach their destinations.

When data is transferred from one device to another on an IP network, the data is
broken down into smaller units called packets. These units carry, along with the data, a
header that contains a lot of information that help them to reach their destination. This
information includes the IP addresses of the source and destination devices, packet
numbers and some other technical information.

These data packets have to cross through a lot of routers to reach their destination .The
work these routers do is called routing. Each of the intermediate routers consults the IP
address of each packet received. Based on this, each will know exactly in which
direction to forward the packet

The packets go through different networks and take different paths. They all finally get
routed to one last destination machine.

On receiver's machine, the destination address and the machine address will match.
The packets will be consumed by the machine, where the IP module on it will
reassemble them and send the resulting data above to the TCP service for further
processing.
23

4.FTP server :

File transfers over the Internet use special techniques, of which one of the oldest and
most widely-used is FTP.

FTP, short for "File Transfer Protocol," can transfer files between any computers that
have an Internet connection, and also works between computers using totally different
operating systems.

Transferring files from a client computer to a server computer is called "uploading" and
transferring from a server to a client is "downloading"..

The FTP server may support Active or Passive connections or both. In an Active FTP
connection, the client opens a port and listens and the server actively connects to it. In
a Passive FTP connection, the server opens a port and listens (passively) and the client
connects to it. We must grant Auto FTP Manager access to the Internet and to choose
the right type of FTP Connection Mode.
24

5.Web server :

Whenever you view a web page on the internet, you are requesting that page from a web
server. When you type a URL into your browser, your browser requests the page from the web
server and the web server sends the page back:

1. Browser Resolves the Domain Name to an IP Address

2. Browser Requests the Full URL

3. Web Server sends the Requested Page

4. Browser Displays the Webpage


25

P2.2
Discuss server types and selection requirement for the given company case study.

A) List & explain the protocols available at the application layer

-HTTP

One of the most commonly used services on the Internet is the World Wide Web
(WWW). The application protocol that makes the web work is Hypertext Transfer
Protocol or HTTP. HTTP is the protocol that web browsers and web servers use to
communicate with each other over the Internet.

This is 7 steps in a communicate between web server and web browser :

1. If the URL contains a domain name, the browser first connects to a domain name
server and retrieves the corresponding IP address for the web server.
2. The web browser connects to the web server and sends an HTTP request for the
desired web page.
3. The web server receives the request and checks for the desired page. If the page
exists, the web server sends it. If the server cannot find the requested page, it
will send an HTTP 404 error message.
4. The web browser receives the page back and the connection is closed.
5. The browser then parses through the page and looks for other page elements it
needs to complete the web page. These usually include images, applets, etc.
6. For each element needed, the browser makes additional connections and HTTP
requests to the server for each element.
7. When the browser has finished loading all images, applets, etc. the page will be
completely loaded in the browser window.
26

-DNS

The Domain Name System is maintained by a distributed database system, which uses
the client–server model. The nodes of this database are the name servers and the top
of the hierarchy is served by the root name servers.

DNS systems allow network clients to convert URLs into IP addresses. This is a key
part of network operation, as computers and other devices need to know each other's IP
address in order to communicate over a network. The client side of the DNS is called a
DNS resolver. A resolver is responsible for translate a domain name into an IP
address. When a network client contacts a resolver, then resolver contacts multiple
authoritative name servers -- the servers that actually hold the IP address information --
in order to get the necessary IP address. DNS requests may involve name servers all
over the world.

FTP

FTP is a protocol designed for transferring files over the Internet.

When files are transferred through FTP, one of two actions is happening – uploading or
downloading. Uploading involves transferring files from a personal computer to a server.
Downloading involves transferring a file from a server to a personal computer. FTP uses TCP/IP
(Transmission Control Protocol/Internet Protocol) to transfer your files. TCP/IP is basically the
language that the Internet uses to carry out commands.

The standard FTP protocol is not encrypted, meaning it is vulnerable to packet sniffers and
other types of snooping attacks. Therefore, the FTPS and SFTP protocols were developed to
provide secure FTP connections. FTPS (FTP with SSL security) provides SSL encryption for all
FTP communication. SFTP (SSH File Transfer Protocol) is a secure version of FTP that uses
SSH to encrypt all data transfers.
27

P2.3
Evaluate rights and security requirements for a given networked environment

We will set access control list for the router to give the access permission for the users and
managers.

Only products manager and NI manager can access to FTP sever .

Only users can access to Web server.

.
28

Task 3
The objective for this task is to address and exhibit understand networking components
and be able to design a network system for the given case study. You are required to
carry out research by using supportive materials like books, websites, etc., and give a
feedback of the findings on all assessment criteria in task 3. The answers need to be
reflected to the given case study.

P3.1

Design a network system diagram using Packet tracer or any other tools of your choice
for the given case study. In the design you should consider current and future provisions
in terms of user requirements and the network infrastructure itself.
29

Task 4

P4.1

Implement a network systems based on the proposed design. You are required to use
means of simulation software, establish a network according to the design in task 3.
Critically review, why different network standards and protocols are necessary

-Why standards are necessary :

Standards exist is to make sure that the hardware and software that is made by different
vendors can work together seamlessly. If there were no networking standards, it would
be difficult to create networks that can share information reliably.

Standards also ensure that customers are not limited to using one vendor which means
they can buy hardware and software from any vendor who is equipped to meet their
standards. This keeps the marketplace healthy and can keep prices competitive.

Why protocols are necessary

Protocols are a set of rules that are used for the exchange of information. They run in
the background so users are unaware of them but every action you take (whether it’s
clicking on a link or dialing a number on a phone) invokes some sort of protocol.

The communication between devices usually begins by the client computer sending a
signal to a server about information on the type of data being requested. Some
exchanges take place which eventually end when the server has closed the connection.

If there were no protocols or rules, computers wouldn’t be able to talk to each other as
these protocols allow computers to communicate in an organized way without
misinterpretation.
30

P 4.2

Evaluate system and user assurance of the implemented system, test network systems
to meet user requirements. Your testing includes functionality of the network to ensure
that your developed network will operate seamlessly in a physical environment so that it
can satisfy user requirements.

Recommend potential enhancement for the networked systems. Your discussions


should include how your developed network will cope with future changing needs and
should address possible enhancements of your network to satisfy needs of changing
future environment.

 Recommend : Buy redundant switches and routers for the larger-scale of the
network in the future.
31

References

Task 1
P1.1
A) Evaluate current name resolution services

TinyDNS. (2018). 5 Advantages And Disadvantages Of Using DNS In Networking


- TinyDNS. [online] Available at: http://tinydns.org/advantages-and-
disadvantages/ [Accessed 26 Sep. 2018].
P1.2
A) Discuss the technologies that support network infrastructure management
-SearchNetworking. (2018). What is Ethernet? - Definition from WhatIs.com.
[online] Available at:
https://searchnetworking.techtarget.com/definition/Ethernet [Accessed 26 Sep.
2018].

-SearchNetworking. (2018). What is PPP (Point-to-Point Protocol)? - Definition


from WhatIs.com. [online] Available at:
https://searchnetworking.techtarget.com/definition/PPP [Accessed 26 Sep.
2018].

Task 2
P2.1
-SearchNetworking. (2018). What is Unshielded Twisted Pair (UTP)? - Definition
from WhatIs.com. [online] Available at:
https://searchnetworking.techtarget.com/definition/Unshielded-Twisted-Pair
[Accessed 26 Sep. 2018].

-The Connection. (2018). What Is FTP And How Does It Work? - The Connection.
[online] Available at: https://internet.frontier.com/resources/resources/internet-
faqs/ftp/ [Accessed 26 Sep. 2018].

Вам также может понравиться